SlideShare une entreprise Scribd logo
1  sur  15
The Rising Threat of Rogue APs
Rogue AP Usually consumer or home-grade APs is an   unauthorized access point   connected to the wired enterprise network
Why is  Rogue AP  such a bad thing?
Carelessly deployed APs can create backdoor entry for  malicious outsiders  into the corporate LAN as RF signal spills out of the building, makes WiFi network available for all
How to fix  Rogue AP  problem? Ban  Rogue APs
A trusted WiFi AP can also be turned into Rogue AP This happens because of some bug, or 0’day vulnerability present in the Access Point (AP) software
Skyjacking Attack Cisco Lightweight Access Point (LAP) contains a vulnerability that could allow an unauthenticated, remote attacker to convert  authorized AP  into  Rogue  by taking full control of it.   http://www.slideshare.net/AirTightWIPS/skyjacking-a-cisco-wlan-attack-analysis-and - countermeasures-2047379
A  Rogue AP  can also be running on a trusted client device e.g. laptop
Windows 7 Laptop Windows 7  Virtual WiFi  Feature Allows a laptop user to run an access point on his/her laptop and simultaneously be connected to another trusted WiFi network through same WiFI client device
Windows 7  Rogue AP  scenario Even  NAC  can’t prevent   a  Rogue AP  running on a trusted laptop A laptop is connected to corporate WiFi LAN and also running a virtual AP allowing a malicious outsider to access corporate LAN
[object Object],[object Object],[object Object],[object Object],So,  The Key Question to ask is
Can we really restrict Rogue APs   from connecting to a corporate network ?
Monitor Air Space 24x7, 365 days Yes. We Can !
Wireless Intrusion Prevention System (WIPS) Detect WiFi misuse and attacks Block WiFi misuse and attacks Locate WiFi devices Monitor Air Space 24x7, 365 days and   detect, prevent and locate all types of Rogue APs
Eliminate Rogue APs  once and for all The Global Leader in  Wireless Security Solutions www.airtightnetworks.com Md Sohail Ahmad [email_address] www.rogueap.com

Contenu connexe

En vedette

More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)
William Lee
 

En vedette (8)

Cracking the Code of Mass Customization
Cracking the Code of Mass CustomizationCracking the Code of Mass Customization
Cracking the Code of Mass Customization
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
Inventum Technologies : Campus WiFi
Inventum Technologies : Campus WiFiInventum Technologies : Campus WiFi
Inventum Technologies : Campus WiFi
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPS
 
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
Introducing TR-069 - An Axiros Workshop for the TR-069 Protocol - Part 1
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)More Details about TR-069 (CPE WAN Management Protocol)
More Details about TR-069 (CPE WAN Management Protocol)
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

The Rising Threat of Rogue APs: Are you ready?

  • 1. The Rising Threat of Rogue APs
  • 2. Rogue AP Usually consumer or home-grade APs is an unauthorized access point connected to the wired enterprise network
  • 3. Why is Rogue AP such a bad thing?
  • 4. Carelessly deployed APs can create backdoor entry for malicious outsiders into the corporate LAN as RF signal spills out of the building, makes WiFi network available for all
  • 5. How to fix Rogue AP problem? Ban Rogue APs
  • 6. A trusted WiFi AP can also be turned into Rogue AP This happens because of some bug, or 0’day vulnerability present in the Access Point (AP) software
  • 7. Skyjacking Attack Cisco Lightweight Access Point (LAP) contains a vulnerability that could allow an unauthenticated, remote attacker to convert authorized AP into Rogue by taking full control of it. http://www.slideshare.net/AirTightWIPS/skyjacking-a-cisco-wlan-attack-analysis-and - countermeasures-2047379
  • 8. A Rogue AP can also be running on a trusted client device e.g. laptop
  • 9. Windows 7 Laptop Windows 7 Virtual WiFi Feature Allows a laptop user to run an access point on his/her laptop and simultaneously be connected to another trusted WiFi network through same WiFI client device
  • 10. Windows 7 Rogue AP scenario Even NAC can’t prevent a Rogue AP running on a trusted laptop A laptop is connected to corporate WiFi LAN and also running a virtual AP allowing a malicious outsider to access corporate LAN
  • 11.
  • 12. Can we really restrict Rogue APs from connecting to a corporate network ?
  • 13. Monitor Air Space 24x7, 365 days Yes. We Can !
  • 14. Wireless Intrusion Prevention System (WIPS) Detect WiFi misuse and attacks Block WiFi misuse and attacks Locate WiFi devices Monitor Air Space 24x7, 365 days and detect, prevent and locate all types of Rogue APs
  • 15. Eliminate Rogue APs once and for all The Global Leader in Wireless Security Solutions www.airtightnetworks.com Md Sohail Ahmad [email_address] www.rogueap.com